-
1
-
-
0027809739
-
Authentication in the taos operating system
-
The Grove Park Inn and Country Club, Asheville, NC. ACM Press
-
Martin Abadi, Edward Wobber, Michael Burrows, and Butler Lampson. Authentication in the taos operating system. In Proceedings of the 14th ACM Symposium on Operating System Principles, pages 256-269, The Grove Park Inn and Country Club, Asheville, NC, 1993. ACM Press.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating System Principles
, pp. 256-269
-
-
Abadi, M.1
Wobber, E.2
Burrows, M.3
Lampson, B.4
-
2
-
-
33845953872
-
-
National Security Agency. Security-Enhanced Linux. http://www.nsa.gov/ selinux/.
-
Security-enhanced Linux
-
-
-
4
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Mitre Corporation, Mitre Corp, Bedford MA, June
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June 1975.
-
(1975)
Technical Report
, vol.MTR-3153
-
-
Biba, K.J.1
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
Dorothy E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
0042349623
-
A trusted open platform
-
Paul England, Butler W. Lampson, John Manferdelli, Marcus Peinado, and Bryan Willman. A trusted open platform. IEEE Computer, 36(7):55-62, 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.W.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
11
-
-
33748087527
-
Trusted platform on demand
-
IBM TRL
-
H. Maruyama et al. Trusted platform on demand. Technical Report RT0564, IBM TRL, 2004.
-
(2004)
Technical Report
, vol.RT0564
-
-
Maruyama, H.1
-
12
-
-
0033690785
-
Lomac: Low water-mark integrity protection for cots environments
-
Washington, DC, USA. IEEE Computer Society
-
Timothy Fraser. Lomac: Low water-mark integrity protection for cots environments. In In Proceedings of the 2000 IEEE Symposium on Security and Privacy, page 230, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 230
-
-
Fraser, T.1
-
13
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
October
-
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003), October 2003.
-
(2003)
Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
14
-
-
84858939217
-
-
Trusted Computing Group. Trusted Computing Group: TPM. https://www.trustedcomputinggroup.org/groups/tpm/.
-
-
-
-
16
-
-
4143132099
-
Resolving constraint conflicts
-
New York, NY, USA. ACM Press
-
Trent Jaeger, Reiner Sailer, and Xiaolan Zhang. Resolving constraint conflicts. In SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies, pages 105-114, New York, NY, USA, 2004. ACM Press.
-
(2004)
SACMAT '04: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
, pp. 105-114
-
-
Jaeger, T.1
Sailer, R.2
Zhang, X.3
-
17
-
-
85048404745
-
Preventing privilege escalation
-
Washington, DC, USA, August
-
Niels Provos, Markus Friedl, and Peter Honeyman. Preventing privilege escalation. In Proceedings of the 12th USENIX Security Symposium, Washington, DC, USA, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Provos, N.1
Friedl, M.2
Honeyman, P.3
-
19
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
New York, NY, USA. ACM Press
-
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, and Leendert van Doom. Attestation-based policy enforcement for remote access. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 308-317, New York, NY, USA, 2004. ACM Press.
-
(2004)
CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Van Doom, L.4
-
20
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, pages 223-238, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
24
-
-
85084164351
-
Linux security modules: General security support for the Linux Kernel
-
San Francisco, CA, USA, August
-
Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, and Greg Kroah-Hartman. Linux Security Modules: General Security Support for the Linux Kernel. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
|